TY - JOUR AU - AB - Objectives: To change the conventional safety mechanism for the omnipresent condition. The security strategies must change with respect to the change in a specific situation. Thus, security approaches must be powerful as well as dynamic. Method: Framework of a ubiquitous computing environment consists of devices in all forms; sensors everywhere seamlessly associated to wireless networks to offer computing / communication services to the user. In this study, we have proposed an architecture that preserves the user’s privacy and authenticates the devices for secure communication between the devices and service providers. Findings: The secure architecture discussed in this research paper uses a unique pass-key exchange with a token combination during the data exchange to protect user privacy. This mechanism not only protects the user privacy but also authen- ticates the user . Application: This architecture can be used anywhere in the ubiquitous environment for security enhancement. Keywords: Authentication, Privacy, Secure Architecture, Secure Communication, Ubiquitous Computing accessible resources by making these computing devices 1. Introduction imperceptible to the user. Correspondence between e Th word Ubiquitous means being everywhere meanwhile devices is blended into environment without redirecting – certain. This might be translated as “PCs Everywhere” . customers. Ubiquitous Computing joins context TI - Secure Communication Architecture for Privacy and Authentication in Ubiquitous Computing JF - Indian Journal of Science and Technology DO - 10.17485/ijst/2017/v10i25/112401 DA - 2017-06-01 UR - https://www.deepdyve.com/lp/unpaywall/secure-communication-architecture-for-privacy-and-authentication-in-rxzXIIkXRP DP - DeepDyve ER -